
Threat Intelligence consisting of Indicators of Compromise and Tactics, Techniques and Procedures is of uppermost importance for identifying cyber threats using signature-based detection techniques. However, large IT infrastructures are often insufficiently protected due to the fact that such approaches rely on predefined attack dictionaries that have to be maintained manually, which requires time- and resource-consuming activities as well as expert knowledge about the attack itself and the system at hand. For this reason, the main goal of this project is the definition of a methodology for an automatic or semi-automatic extraction of actionable Threat Intelligence from raw and unstructured log data allowing timely reaction to immanent threats. The proposed approach is thereby able to gather security-relevant information about previously unknown attacks using self-learning Anomaly Detection techniques that process log streams from arbitrary sources in real time. Correlating the identified anomalies across multiple layers and diverse systems reduces false alarms and enables that multi-stage intrusions comprising complex dynamic patterns are enriched with information about the context and the circumstances of attacks in order to provide comprehensive protection for all participants making use of the insights shared on public threat intelligence platforms.
On the event of the adoption of the draft regulation laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union, the AI4HealthSec project kicked off a process to provide its opinion.
Cyberwatching.eu has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 740129. The content of this website does not represent the opinion of the European Commission, and the European Commission is not responsible for any use that might be made of such content. Privacy Policy | Disclaimer / Terms and Conditions of Use